Security protocols and APIs are difficult to specify and implement. Most of the time, for example for the next version of the TPM, a reference implementa-tion, often written in C, is the only formal specification. In this talk, we show how VCC, a general-purpose C verifier that was previously used to prove sym-bolic security properties [DGJN11], can be used to prove computational security properties, including, for the first time, computational indistinguishability, of protocols and APIs implemented in C. To do so, we rely on VCC to prove that the C program has the same ob-servable input-output behaviour as a reference implementation written in F#. We then use the F7 type-checkeras described in [FKS11]to prove perfect secu-rity properties o...
International audienceDistributed applications are difficult to program reliably and securely. Depen...
International audienceWe present an analysis of key wrapping APIs with generic policies. We prove th...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
We describe how to verify security properties of C code for cryptographic protocols by using a gener...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
We propose an approach for verifying cryptographic protocol implementations written in C. We statica...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
The security of much critical infrastructure depends in part on cryptographic software coded in C, a...
Directly verifying security protocol code could help prevent major security flaws in communication s...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
Abstract. We study the problem of verifiable computation (VC) in which a computationally weak client...
Protecting the confidentiality of information manipulated by a computing system is one of the most i...
International audienceDistributed applications are difficult to program reliably and securely. Depen...
International audienceWe present an analysis of key wrapping APIs with generic policies. We prove th...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
We describe how to verify security properties of C code for cryptographic protocols by using a gener...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
We propose an approach for verifying cryptographic protocol implementations written in C. We statica...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
The security of much critical infrastructure depends in part on cryptographic software coded in C, a...
Directly verifying security protocol code could help prevent major security flaws in communication s...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
Abstract. We study the problem of verifiable computation (VC) in which a computationally weak client...
Protecting the confidentiality of information manipulated by a computing system is one of the most i...
International audienceDistributed applications are difficult to program reliably and securely. Depen...
International audienceWe present an analysis of key wrapping APIs with generic policies. We prove th...
We present the design of a new symmetric key management API for cryptographic devices intended to im...